<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Jarred LeFebvre</title>
	<atom:link href="http://www.gfi.com/blog/author/jarred-lefebvre/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Survey: 5 Most Ridiculous Things IT Admins Have Seen Business Users Do [INFOGRAPHIC]</title>
		<link>http://www.gfi.com/blog/survey-5-most-ridiculous-things-it-admins-have-seen-business-users-do-infographic/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=survey-5-most-ridiculous-things-it-admins-have-seen-business-users-do-infographic</link>
		<comments>http://www.gfi.com/blog/survey-5-most-ridiculous-things-it-admins-have-seen-business-users-do-infographic/#comments</comments>
		<pubDate>Thu, 19 Apr 2012 11:05:14 +0000</pubDate>
		<dc:creator>Jarred LeFebvre</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[GFI]]></category>
		<category><![CDATA[Infographic]]></category>
		<category><![CDATA[IT admins]]></category>
		<category><![CDATA[survey]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8452</guid>
		<description><![CDATA[If you work in an office, chances are you have seen a frantic IT guy or gal running around trying to put out virtual fires, and you’ve wondered what all the fuss was about. In addition to the numerous, legitimate, &#8230;]]></description>
				<content:encoded><![CDATA[<p>If you work in an office, chances are you have seen a frantic IT guy or gal running around trying to put out virtual fires, and you’ve wondered what all the fuss was about. In addition to the numerous, legitimate, technical glitches that can come up when operating a data center, there are also lots of mind-numbing issues that IT admins run into when it comes to supporting users. GFI was curious to find out how stressed IT admins are and what causes all that tension, so we surveyed hundreds of <a href="http://www.gfi.com/documents/stress-survey-2012.pdf">IT admins in the U.S. and the UK</a>. The topline results were very interesting, but it was when we dug deeper that we learned just how strange the daily user support situations really are.</p>
<p>Here are the top five categories for the most ridiculous things users do, as well as some odds and ends you have to read to believe . . .<span id="more-8452"></span></p>
<p><strong>1.       </strong><strong>We Need More Power!!</strong></p>
<p>An overwhelming amount of IT administrators said they have received complaints or support calls from users who did not know that a computer does not work without power. In one case, the user’s frustration caused them to destroy their machine, not realizing it simply needed to be plugged in.  One respondent even told us that a user did not understand that they had plugged a power strip “into itself” and couldn’t figure out why their computer wasn’t powering up.</p>
<p><strong>2.     </strong><strong>My Computer Looked Thirsty</strong></p>
<p>One admin put it best with a tongue-in-cheek response that read,</p>
<blockquote><p>“[Users] drink and eat in front of the computer and they feed the keyboard with water.”</p></blockquote>
<p>Spills are bound to happen, but IT admins cringe when liquids find their way directly into the keyboard, in most cases ruining the machine. Coffee, water and soda were the most often cited offending liquids.  In fact, there were several instances of users turning their CD/DVD tray into a coffee cup holder! One respondent pointed out that not all spills happen in the office either.</p>
<blockquote><p>One user “brought in a damaged work laptop, swore that her kids never go near it, and then we found spilled soda in the keyboard and the kids&#8217; homework on the hard drive.”</p></blockquote>
<p><strong>3.       </strong><strong>We Don’t Need No Stinking Passwords</strong></p>
<p>One of the biggest problems IT admins see when it comes to security is that users frequently subvert the purpose of passwords by not securing them. Aside from the traditional bad habits of sticking passwords to monitors with Post-It notes, using “password” as a password, and talking about a password publicly, there was even one case of a user posting their user name and password on a social network to &#8220;see how many people would steal it.”</p>
<p><strong>4.       </strong><strong>This PC Will Self-Destruct in 5 Seconds</strong></p>
<p>There were also quite a few IT admins who said their users have KNOWINGLY downloaded malware, through a number of different methods. Similar to the social network password poster mentioned earlier, one user clicked on a link in an email that they knew was a virus “just to see what would happen.” Another clicked on the same pop-up ad frequently, installing a virus that had already been removed multiple times from their machine, even after being warned by IT to stop doing it. Yet another user continually responded to phishing emails with their personal credentials while one person even tried to download and install a forbidden software application and completely erased the hard drive.</p>
<p><strong>5.       </strong><strong>Just Making Some Room Here . . .</strong></p>
<p>Many of our respondents said that their users had deleted important files or data to make room on their hard drive, which in most cases already had plenty of space remaining. In some cases, the deleted files were actually drivers that the computer needed in order to run.<br />
Perhaps one of the more comical things that IT admins see is “creative” use of the mouse. Users have been known to use their mouse like a remote control – pointing it at the screen and clicking it. There was also a reported case of a user putting their mouse directly on the screen and rolling it around on the surface to maneuver the cursor.</p>
<p>Also, while largely an ineffective method, IT admins have witnessed users talking directly to their computers when they have an issue.</p>
<blockquote><p>One user spoke “to a PC because the sign under the screen said &#8216;If you have problems with your computer speak to IT&#8217;.”</p></blockquote>
<p>On the darker side, users have been known to take out their frustrations on their machines and colleagues as well. From throwing a machine on the ground because it “didn’t work right,” to shaking a computer “like an Etch A Sketch,” to throwing a piece of equipment “at someone” because it didn’t function properly – IT admins have seen it all. One IT admin even reported that a user threatened him with a hammer when faced with a frustrating computer issue. Talk about stress!</p>
<p>One final piece of feedback from the IT administrators we surveyed . . . Contrary to popular belief, they are not super human. Expecting them to work 24&#215;7 or turn around major changes with unrealistic deadlines is not always feasible. So keep in mind some of the problem areas above if you want to stay on your gatekeeper of technology’s good side. And failing that, if nothing else they’d probably be thankful enough if you could simply avoid “watering” your machine.</p>
<p>Are you an IT admin with a unique user faux pas story? Or a user who wants to clear your conscience about causing some stress for your IT department? Let’s have some fun. Leave a comment below.</p>
<p>Do any of these findings surprise you?</p>
<p>Here’s our infographic visualizing the survey’s US data:</p>
<p><span style="text-align: center;"> </span></p>
<p style="text-align: center;"><a style="color: #ff4b33; line-height: 24px; font-size: 16px;" href="http://www.gfi.com/blog/wp-content/uploads/2012/04/infographic-stress-survey-us-3.jpg"><img class="size-full wp-image-8461 aligncenter" style="border-image: initial; margin-top: 10px; margin-bottom: 10px; border-width: 0px; border-color: black; border-style: solid;" title="Infographic IT admins stress survey - US" src="http://www.gfi.com/blog/wp-content/uploads/2012/04/infographic-stress-survey-us-3.jpg" alt="Infographic IT admins stress survey - US" width="538" height="336" /></a></p>
<div><span style="font-size: small;"><span style="line-height: 24px;"><span style="text-decoration: underline;"><br />
</span></span></span><br />
<strong></strong></div>
<div><strong><a href="http://www.gfi.com/blog/wp-content/uploads/2012/04/infographic-stress-survey-uk.jpg" target="_blank">View the UK version of the infographic</p>
<p></a></strong></div>
<div>
<p>&nbsp;</p>
<p><em>Like our surveys and infographics? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></p>
</div>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/survey-5-most-ridiculous-things-it-admins-have-seen-business-users-do-infographic/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
		<item>
		<title>Survey: Americans OK with Web Monitoring at Work</title>
		<link>http://www.gfi.com/blog/survey-americans-ok-with-web-monitoring-at-work/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=survey-americans-ok-with-web-monitoring-at-work</link>
		<comments>http://www.gfi.com/blog/survey-americans-ok-with-web-monitoring-at-work/#comments</comments>
		<pubDate>Thu, 08 Mar 2012 16:00:11 +0000</pubDate>
		<dc:creator>Jarred LeFebvre</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[GFI WebMonitor]]></category>
		<category><![CDATA[internet usage policy]]></category>
		<category><![CDATA[survey]]></category>
		<category><![CDATA[web monitoring]]></category>
		<category><![CDATA[web monitoring software]]></category>
		<category><![CDATA[web security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8260</guid>
		<description><![CDATA[GFI Software recently conducted a survey of 620 US workers, and a significant majority of them do not consider employers’ use of web monitoring software an invasion of privacy. Survey respondents split almost evenly about whether or not their employer &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/web-monitoring-at-work.jpg"><img class="alignright size-full wp-image-8264" style="border-image: initial; border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="web-monitoring-at-work" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/web-monitoring-at-work.jpg" alt="" width="360" height="240" /></a>GFI Software recently conducted a survey of 620 US workers, and a significant majority of them do not consider employers’ use of web monitoring software an invasion of privacy.</p>
<p>Survey respondents split almost evenly about whether or not their employer uses a web monitoring solution, with only about 10% unsure if such software is being used in their workplace. Contrary to what some employers may think, the survey found that 81% of respondents say they do not consider the use of web monitoring software an invasion of employee privacy.<span id="more-8260"></span></p>
<p>While we had considerably lower responses from other regions, this view of web monitoring software is not limited to just US employees. 36 workers in the UK responded to our survey, and 77% of them do not view web monitoring as an invasion of their privacy either. The same went for Canada and Australia, where more than 80% of 55 and 42 respondents, respectively, overwhelming say they too do not view web monitoring software as a breach of their privacy at work.</p>
<p>This viewpoint not only spans geographies, but age groups as well. Nearly 87% of respondents older than 60, 78% between the ages of 40 and 59, and 72% younger than 40 do not view web monitoring at work as a privacy issue.</p>
<p><strong><br />
Deploying Web Monitoring Software</strong></p>
<p>An increasing number of employers recognize how solutions like <a href="http://www.gfi.com/internet-monitoring-software">GFI WebMonitor</a> can help strengthen their web security, better control their network bandwidth and track all online activity occurring on their network. However, establishing an Internet usage policy and then deploying a web monitoring solution to enforce it is a sensitive issue for many employers. Why? Because many fear negative reactions from employees, who may feel their privacy is being invaded. However, GFI Software’s survey results suggest that employees are much more receptive to web monitoring software than many employers may assume.</p>
<p>Remember that communication is key to the successful rollout of any software application, especially one with the potential to impact how every employee works and accesses the Internet every day. When deploying web monitoring software:</p>
<ul>
<li>Make sure your <strong>Internet usage policy</strong> is complete and clearly defines what is and what is not acceptable for employees with Internet access</li>
<li><strong>Communicate with employees</strong> and make sure they understand your Internet usage policy and the role that your web monitoring software plays in not only enforcing it but also protecting the company from various online threats</li>
<li><strong>Invite feedback</strong> and modify your policy and your web monitoring rules when appropriate</li>
</ul>
<p>&nbsp;</p>
<p><strong>Survey Methodology </strong></p>
<p>This survey, conducted in February 2012, was sent to recipients of GFI Software’s <a href="http://vipresecuritynews.com/">VIPRE Security News</a> newsletter. More than 1,600 people responded. More than 800 respondents described themselves as currently employed and were asked to share their opinion of employers’ use of web monitoring software.  This was not a scientific study.</p>
<p>&nbsp;</p>
<p><em>Like our surveys and infographics? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/survey-americans-ok-with-web-monitoring-at-work/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Survey: UK Lags US in Using the Cloud to Combat Spam [INFOGRAPHIC]</title>
		<link>http://www.gfi.com/blog/survey-uk-lags-us-in-using-the-cloud-to-combat-spam-infographic/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=survey-uk-lags-us-in-using-the-cloud-to-combat-spam-infographic</link>
		<comments>http://www.gfi.com/blog/survey-uk-lags-us-in-using-the-cloud-to-combat-spam-infographic/#comments</comments>
		<pubDate>Thu, 01 Mar 2012 14:35:49 +0000</pubDate>
		<dc:creator>Jarred LeFebvre</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[anti-spam]]></category>
		<category><![CDATA[combat spam]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing attacks]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[spam protection]]></category>
		<category><![CDATA[survey]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8197</guid>
		<description><![CDATA[Spam may not be the headline-grabbing topic it once was, but as our research friends in the GFI Labs continue to point out, spam and phishing attacks are still a preferred tactic of cybercriminals. To get a better sense of &#8230;]]></description>
				<content:encoded><![CDATA[<p>Spam may not be the headline-grabbing topic it once was, but as our research friends in the GFI Labs continue to point out, <a href="http://www.gfi.com/blog/phishers-bank-on-tax-season/">spam and phishing attacks</a> are still a preferred tactic of cybercriminals.</p>
<p>To get a better sense of how businesses are coping with spam, we conducted a survey this month of 200 US and 200 UK IT decision makers at businesses with between five and 1,000 employees. While we assumed businesses continue to struggle with spam, we were surprised to learn how many businesses are not taking advantage of the latest technology available to them to combat these threats and better defend their networks.<span id="more-8197"></span></p>
<p>An overwhelming majority of survey respondents—72% in the US and 75% in the UK—state they receive too much spam. Not a terribly surprising stat, but when asked about the volume of spam they were dealing with over the last year, more than 80% of respondents in both regions reported no decrease in the amount of spam plaguing their networks. In fact, 53% of US respondents and 61% of UK respondents report that spam volumes actually increased during the last year. Only about 15% of respondents saw a decrease in spam.</p>
<p>Seeing those numbers, it’s no surprise that 70% of respondents rate their anti-spam solution as either marginally effective or not effective at all. So what solutions are these businesses using to defend their networks? Here’s a breakdown:</p>
<p>&nbsp;</p>
<table border="1" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td valign="top" width="433">
<p align="center"><strong>Anti-Spam Solution</strong></p>
</td>
<td valign="top" width="102">
<p align="center"><strong>US</strong></p>
</td>
<td valign="top" width="103">
<p align="center"><strong>UK</strong></p>
</td>
</tr>
<tr>
<td valign="top" width="433">Rely on anti-spam capabilities of an antivirus suite</td>
<td valign="top" width="102">
<p align="center">48%</p>
</td>
<td valign="top" width="103">
<p align="center">46%</p>
</td>
</tr>
<tr>
<td valign="top" width="433">Rely on an anti-spam software solution</td>
<td valign="top" width="102">
<p align="center">20%</p>
</td>
<td valign="top" width="103">
<p align="center">19%</p>
</td>
</tr>
<tr>
<td valign="top" width="433">Rely on a cloud-based solution</td>
<td valign="top" width="102">
<p align="center">14%</p>
</td>
<td valign="top" width="103">
<p align="center">8%</p>
</td>
</tr>
<tr>
<td valign="top" width="433">Rely on an anti-spam gateway appliance</td>
<td valign="top" width="102">
<p align="center">11%</p>
</td>
<td valign="top" width="103">
<p align="center">22%</p>
</td>
</tr>
<tr>
<td valign="top" width="433">Do not use an anti-spam solution</td>
<td valign="top" width="102">
<p align="center">5%</p>
</td>
<td valign="top" width="103">
<p align="center">5%</p>
</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>There are some interesting findings revealed here.</p>
<p>First, while the heavy reliance on the anti-spam capabilities of an antivirus security suite is nearly identical in both regions, it is not among the smallest businesses where that is most prevalent. The highest percentage of businesses (about 65%) in the US and UK saying they rely on their antivirus suite for spam protection was among businesses with 50 – 99 employees. It was not among businesses with fewer than 50 employees, where one would expect less robust IT security awareness and expertise.</p>
<p>Second, it appears that US businesses have been quicker than their UK counterparts to adopt cloud-based solutions to battle spam and phishing attacks before they reach their network. More than 14% of US businesses are already using a cloud-based solution to combat spam compared to only 8% of businesses in the UK.</p>
<p>GFI Software is a strong proponent of a multi-layered approach to mail security. A comprehensive anti-spam solution incorporates a combination of defenses located on premise and in the cloud, which GFI Software provides through its <a href="http://www.gfi.com/mes">GFI MailEssentials</a><sup>™</sup>, <a href="http://www.gfi.com/exchange-antivirus-software">GFI MailSecurity</a><sup>™</sup> and <a href="http://www.gfi.com/hosted-email-security-solution">GFI MailEssentials Complete Online</a>™ product offerings. GFI MailEssentials Complete Online is the latest addition to GFI Software’s mail defense suite. This cloud-based service delivers fast, accurate response against inbound and outbound spam attacks and full defense against viruses, Trojans, spyware, worms, bots, rootkits, zero-hour exploits and other threats.</p>
<h3><strong><br />
Businesses Know The Dangers of Spam</strong></h3>
<p>When asked about their top concerns about spam, security clearly topped the list. In the US, 29% of respondents say their top concern was malicious links and files often harbored in spam, while 22% cite how spam leaves their company and employees vulnerable to phishing attacks. In the UK, 23% and 22% of respondents cite malicious links and files, and potential phishing attacks, respectively, as their top concerns. Additionally, 20% of UK IT decision makers say spam’s impact on the responsiveness of their mail servers was their top concern.</p>
<p>Finally, nearly 90% of all respondents in both regions say they regularly educate employees about the risks of opening spam that arrives in their inbox. But are they doing enough? 40% of businesses in the UK and 44% of businesses in the US say their networks have been compromised as a result of employees opening malicious links or by responding to information requests contained within spam. Until businesses take full advantage of the latest technologies available to them to better block spam, they’re going to have to rely heavily on a well-educated employee base. We can probably all agree that is not enough.</p>
<p>How do you combat spam? Do any of these findings surprise you?</p>
<p>Here&#8217;s our infographic visualizing the survey&#8217;s US data:</p>
<p style="text-align: center;"><img class="size-full wp-image-8198 aligncenter" style="border-width: 0px; border-color: black; border-style: solid; margin: 10px;" title="GFI Spam Survey 2012 - US" src="http://www.gfi.com/blog/wp-content/uploads/2012/03/spam-survey-2012-US.jpg" alt="Spam Survey Infographic 2012 - US" width="500" height="2488" /></p>
<p><strong><a href="http://www.gfi.com/blog/wp-content/uploads/2012/03/spam-survey-2012-UK.jpg" target="_blank">View the UK version of the infographic</a></strong></p>
<p><span class="Apple-style-span" style="color: #000000; font-size: 17px; line-height: 25px;"><strong><br />
Survey Methodology</strong></span></p>
<p>The independent blind survey of 200 US and 200 UK IT decision makers organizations with between five and 1,000 employees was conducted by Opinion Matters on behalf of GFI Software. <a href="http://www.gfi.com/documents/Research-brief-Spam.pdf">Download the full survey results</a>.</p>
<p><em>Like our surveys and infographics? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/survey-uk-lags-us-in-using-the-cloud-to-combat-spam-infographic/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 01:25:11 by W3 Total Cache --